Injection of arbitrary HTML/JavaScript code through the media download URL
Package
Affected versions
>= 2.6.0, <= 2.6.4
>= 2.0.0, <= 2.5.20
Patched versions
2.6.5
2.5.21
Description
Published by the National Vulnerability Database
Oct 3, 2024
Published to the GitHub Advisory Database
Oct 3, 2024
Reviewed
Oct 3, 2024
Last updated
Oct 17, 2024
Impact
This vulnerability allows an attacker to inject arbitrary HTML/JavaScript code through the media download URL in Sulu CMS. It affects the SuluMediaBundle component. The vulnerability is a Reflected Cross-Site Scripting (XSS) issue, which could potentially allow attackers to steal sensitive information, manipulate the website's content, or perform actions on behalf of the victim.
Patches
The problem has not been patched yet. Users should upgrade to patched versions once they become available. Currently affected versions are:
Workarounds
Until an official patch is released, users can implement additional input validation and output encoding for the 'slug' parameter in the MediaStreamController's downloadAction method. Alternatively, configuring a Web Application Firewall (WAF) to filter potentially malicious input could serve as a temporary mitigation.
References
References